General

  • Target

    1c4a9458282a0a3370ec47bc1835bd13

  • Size

    2.4MB

  • Sample

    231225-ak94nabdf4

  • MD5

    1c4a9458282a0a3370ec47bc1835bd13

  • SHA1

    2921c126ce9770ade4a9bdb42353b54c568a738f

  • SHA256

    51570d0fdc770b93a0bfa15fa1ba045db0af3ed84b8820f5a171f89094f68129

  • SHA512

    73e92d1c6ed020152393f74c819c1b86390cf1d9ca6009a4132d6c60e6a218f06787c4ac805953955a8764373a4af7ac8d261175c20b3c9ce1e55a2d273bff4c

  • SSDEEP

    49152:R1zlDb6EGxS2Z71r9hAPS86Jy4l/YZA6bDK3m5zLK60L/:R1zNb6EqS2Z71rHAPLGy4l/P6PK3m5zQ

Malware Config

Targets

    • Target

      1c4a9458282a0a3370ec47bc1835bd13

    • Size

      2.4MB

    • MD5

      1c4a9458282a0a3370ec47bc1835bd13

    • SHA1

      2921c126ce9770ade4a9bdb42353b54c568a738f

    • SHA256

      51570d0fdc770b93a0bfa15fa1ba045db0af3ed84b8820f5a171f89094f68129

    • SHA512

      73e92d1c6ed020152393f74c819c1b86390cf1d9ca6009a4132d6c60e6a218f06787c4ac805953955a8764373a4af7ac8d261175c20b3c9ce1e55a2d273bff4c

    • SSDEEP

      49152:R1zlDb6EGxS2Z71r9hAPS86Jy4l/YZA6bDK3m5zLK60L/:R1zNb6EqS2Z71rHAPLGy4l/P6PK3m5zQ

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks